1268 Commits

Author SHA1 Message Date
Tie
e1039ded5c
fix(AWS Schedule): Fix IAM role assignment (#12030) 2023-06-28 09:28:08 +02:00
Ben
483ea166fc
feat(AWS MSK): Support AT_TIMESTAMP starting position (#12034) 2023-06-22 13:19:32 +02:00
James Kyburz
a50773b60d
fix(AWS Websocket): Fix internal authorizers handling (#11871) 2023-06-20 14:10:49 +02:00
Inqnuam
04db0f045c
fix(AWS ALB): Recognize CIDR format at ip configuration (#11889) 2023-06-09 10:56:40 +02:00
Kirill Khoroshilov
4582913214
fix(Packaging): Fix merging DependsOn from user resources (#12009) 2023-06-07 16:42:52 +02:00
Inqnuam
72b27cb4fe
fix(AWS ALB): Allow multiple http-header conditions (#11888) 2023-05-31 10:23:58 +02:00
AntonioGM
41e90c3043
fix(AWS CloudFront): Accept CF intrinsic functions in behavior
(PR #11994)
2023-05-30 16:26:40 +02:00
Goran Rakic
3afb71e39d
feat(AWS Lambda): Response streaming for Lambda URL (#11907) 2023-05-29 13:32:44 +02:00
Mieszko Kycermann
4d64730130
feat(AWS Deploy): --minify-template CLI param (#11980) 2023-05-24 17:53:41 +02:00
Peter Reshetin
9d7b121bd1
feat(AWS Kinesis): More reliable consumer naming mode (#9706) 2023-05-17 14:44:07 +02:00
Tie
34d922d3d8
feat(AWS Schedule): AWS::Scheduler::Schedule based triggers (#11935) 2023-05-17 11:35:14 +02:00
Mitch Dempsey
d6de3346ce
feat(AWS EventBridge): Recognize $or in pattern property (#11967) 2023-05-15 17:48:41 +02:00
Rob Nielsen
75ce58b194
fix(AWS CloudWatch): Ensure no circular resource references (#11893) 2023-05-08 18:44:09 +02:00
Duy Tran
30dd50a90c
refactor: Remove BbPromise.bind usage (#11875) 2023-03-31 16:32:37 +02:00
Jonathan Keslin
93393777cb
feat(AWS CLoudFront): Recognize OriginAccessControlId field (#11855) 2023-03-24 10:23:54 +01:00
Anthony Roussel
2efe8169c9
feat(AWS EventBridge): description property (#11821) 2023-03-16 12:40:35 +01:00
Rob Nielsen
16dd286a1d
fix: Fix function references when represented by alias (#11788) 2023-03-14 12:39:51 +01:00
SleepWithCoffee
5068516f04
refactor: Replace BbPromise.each with native counterpart (#11797) 2023-03-13 10:05:45 +01:00
SleepWithCoffee
86bb67d15f
fix: Do not crash on null resource properties input (#11789) 2023-03-13 09:43:57 +01:00
Duy Tran
1181780265
refactor: Replace _.entries with Object.entries (#11793) 2023-03-10 13:52:51 +01:00
Himanshu Pant
8db2f4cbc5
fix(AWS Lambda): Fix runtimeManagment handling (#11778) 2023-03-07 09:21:55 +01:00
Charlie Benger-Stevenson
6fe2ea5bc8
fix(AWS API Gateway): Fix support for provider.apiGateway.stage
(PR #11772)
2023-03-03 17:18:54 +01:00
Mariusz Nowak
74c3ae004c refactor: Supress AWS SDK v2 deprecation message 2023-03-01 18:06:50 +01:00
Martin Gerlach
7410275f66
feat(AWS Lambda): Ensure logs:TagResource permission to IAM role (#11766)
As announced by AWS in Dec 2022, there is a new API for tagging CloudWatch resources. New accounts/roles that need to tag CloudWatch LogGroups need the new `logs:TagResouce permission`.
2023-02-28 09:25:06 +01:00
ROSeaboyer
56d8bec849
feat(AWS Lambda): Recognize CF functions at .provisionedConcurrency
(PR #11760)
2023-02-21 17:18:50 +01:00
ROSeaboyer
18d4d69eb3
feat(AWS Lambda): Support runtimeManagement config (#11715) 2023-02-02 13:35:10 +01:00
ROSeaboyer
fc6bd57bbf
feat(AWS Schedule): Support CF instrinsic functions at .rate (#11714) 2023-01-31 09:48:06 +01:00
ROSeaboyer
b925c4cf9c
feat(AWS EventBridge): Support functions[].events[].eventBridge.name
(PR #11690)
2023-01-19 15:03:44 +01:00
Jason Rowsell
57f27193e0
feat(AWS SQS): Support functions[].events[].sqs.maximumConcurrency
(PR #11678)
2023-01-18 11:51:50 +01:00
ROSeaboyer
99cd9e69c1
refactor(AWS SQS): Optimize IAM permissions generation (#11685) 2023-01-18 11:49:40 +01:00
Shreyance Jain
e769570704
feat(AWS RabbitMQ): Support functions[].events[].filterPatterns (#11659) 2023-01-05 15:46:10 +01:00
Shreyance Jain
1b55710f0a
feat(AWS ActiveMQ): Support functions[].events[].filterPatterns (#11656) 2023-01-05 15:05:15 +01:00
Jason Rowsell
6a5e8d9ff3
feat(AWS Kafka): Support functions[].events[].filterPatterns (#11645) 2023-01-05 12:35:50 +01:00
Jason Rowsell
b7d6af6b13
feat(AWS SNS): Support functions[].events[].filterPolicyScope (#11644) 2022-12-30 16:16:55 +01:00
Shreyance Jain
63584a9a0d
feat(AWS MSK): Support functions[].events[].filterPatterns (#11636) 2022-12-28 15:12:47 +01:00
Jason Rowsell
906ea319dd
feat(AWS CloudFront): Recognize behavior.ResponseHeadersPolicyId
(PR #11633)
2022-12-27 12:34:40 +01:00
timo92
2a5e11a997
feat: provider.logDataProtectionPolicy and functions[].logDataProtectionPolicy (#11599) 2022-12-20 14:28:39 +01:00
Baerten Dennis
adf11b75e5
feat(AWS Lambda): functions[].snapStart support (#11576) 2022-12-16 15:00:59 +01:00
franzmango
4169ae183f
feat(AWS API Gateway): Allow CF funcs in authorizer.scopes (#11505) 2022-11-08 13:37:21 +01:00
Daniele Iasella
858758ea1e
feat(AWS Kafka): Support startingPositionTimestamp (#11479) 2022-11-07 15:14:32 +01:00
Mariusz Nowak
f3a191590b feat(Console): Remove support for integrated configuration 2022-10-31 16:07:52 +01:00
Pavan Andhukuri
0a49c4f5df
feat(AWS API Gateway): support provider.apiGateway.stage (#11487) 2022-10-31 13:02:55 +01:00
Daniele Iasella
5d41995c19
feat(AWS Kinesis): Support AT_TIMESTAMP starting position (#11483) 2022-10-31 10:30:42 +01:00
Jurriaan Proos
c5ca9b78fa
fix: Ensure maximum API gateway timeout (#11453) 2022-10-19 10:28:24 +02:00
Arthur Weber
65e9860838
feat(AWS CloudFront): Allow legacy behavior configuration (#11411) 2022-09-30 14:16:04 +02:00
Phil-Pinkowski
9bb3f11541
feat(AWS Kafka): Support consumerGroupId option (#11345) 2022-08-26 11:10:47 +02:00
Mariusz Nowak
91aff1d1c2 refactor: Remove obsolete comment 2022-08-16 13:52:34 +02:00
pjmattingly
544717e703
refactor: Remove left over internal self: handling (#11279)
It's specific to old variables resolver, which was removed with v3
2022-07-28 16:57:07 +02:00
pjmattingly
b36cdf2db6
refactor: Replace _.flatten with Array.prototype.flat (#11271) 2022-07-28 12:42:51 +02:00
pjmattingly
4f7e12939c
refactor: Replace _.flatMap with Array.prototype.flatMap (#11272) 2022-07-28 10:45:41 +02:00