4082 Commits

Author SHA1 Message Date
Mariusz Nowak
fbf99fa2ab feat(AWS HTTP API): JWT authorizers support 2020-02-18 14:59:28 +13:00
Mariusz Nowak
1dcc53be4c refactor(AWS HTTP API): Nest routeTargetData in config 2020-02-18 14:59:28 +13:00
coyoteecd
9b701a4056
feat(AWS APIGW): Support logs.restApi.roleManagedExternally (#7333) 2020-02-18 13:59:57 +13:00
Mariusz Nowak
ca69387285 feat(AWS HTTP API): CORS configuration 2020-02-17 14:25:19 +13:00
Mariusz Nowak
dfeca8e622 test(AWS HTTP API): Rename fixture 2020-02-17 14:25:19 +13:00
Mariusz Nowak
44c2342aeb fix(AWS HTTP API): Publish to default stage
Framework for each stage creates new API,
therefore there's no point in generating a stage
2020-02-17 13:41:09 +13:00
Mariusz Nowak
ed4b6efe69 test(AWS HTTP API): Fix typo 2020-02-17 13:41:09 +13:00
Isen
3910df1ba6
feat: Support provider.alb.targetGroupPrefix setting (#7322) 2020-02-14 15:49:02 +13:00
Zac Charles
9eba2187f9
feat: Support Kinesis Enhanced Fan-out (Consumer) streams (#7320) 2020-02-14 13:09:27 +13:00
Geoff Baskwill
7abb23edc8
feat: Support managedExternally option for authorizers (#7327)
There are use cases where an API creator does not have permissions to
add permissions to the custom authorizer lambda; one example is when
the custom authorizer lambda exists in a separate AWS account. In these
cases, we need to be able to omit the `AWS::Lambda::Permission` resource
from the stack.

This change adds the `managedExternally` attribute to the `authorizer`.
When `managedExternally` is `true`, the stack will not create the
`AWS::Lambda::Permission` resource.

**Important note:** The permission does still need to be created before
the stack is deployed, or creating the authorizer will fail.
2020-02-13 12:20:16 +13:00
Thomas Schaaf
09466b5a17
feat: Support provider.rolePermissionsBoundary to set IAM boundary (#7319) 2020-02-13 09:43:24 +13:00
Richard Davison
f6d9bfd6c6
feat: Improve performance of local invocation using docker (#7178) 2020-02-12 11:21:45 +13:00
Edmundo Rodrigues
0592a27dbc
feat: Support tweaking max concurrent artifcat uploads count (#7295) 2020-02-12 10:04:20 +13:00
Philipp Muens
c05dcb3432 fix: Limited permission for authorizers 2020-02-11 12:52:03 +01:00
Edmundo Rodrigues
148b8b72b4
docs: Clarify sls logs command startTime parameter's default value (#7299) 2020-02-11 13:33:07 +13:00
tom-marsh
33291c8d08 fix: Websocket route names normalization (#7294) 2020-02-10 19:14:33 +11:00
Edmundo Rodrigues
024146885a
feat: Support deploymentBucket.maxPreviousDeploymentArtifacts customization (#7283) 2020-02-10 13:00:42 +11:00
Mariusz Nowak
69170d09a8 feat(AWS HTTP API): Initial basic routes configuration support 2020-02-05 12:31:43 +01:00
Mariusz Nowak
acb3dbba42 refactor(AWS APIGW): Secure APIGateway endpoints resolution 2020-02-05 12:31:43 +01:00
Mariusz Nowak
3a6865db7f refactor(AWS Lambda): Generalize target alias resolution 2020-02-05 12:31:43 +01:00
Richard Davison
382c0bfc21
feat: Support rich and reusable S3 buckets configuration (#7156) 2020-01-31 16:12:37 +04:00
Sydney Kereliuk
ea4ac262ea
feat: Support destinations config on stream events (#7262) 2020-01-30 23:17:11 +04:00
Petr Reshetin
4468805d2a
fix: Fix sls logs so it also covers output from aliases (#7270)
Fixes #7214
2020-01-30 16:20:18 +04:00
Petr Reshetin
9f0131fedf
fix: Ensure deterministic WebSockets deployment id (#7248)
To support skip of deployments when no changes are detected
2020-01-29 16:09:43 +04:00
ncipollina
0549d85bc0 feat: azure-nodejs-typescript template. (#7252) 2020-01-24 14:54:23 +01:00
tcastelli
4f273785f4 feat: Support RedrivePolicy configuration on SNS events (#7239) 2020-01-24 13:05:51 +01:00
Ivaylo Novakov
1793cf8d7a fix: Do not overwrite go.mod on make in Go template (#7245) 2020-01-22 08:58:48 +01:00
Mariusz Nowak
f1cc3a8998 test: Update to not rely on side ServerlessError feature 2020-01-21 13:20:02 +01:00
Mariusz Nowak
c7fea34e85 fix: Separate AWS region and credentials resolution concern
Dashboard plugin at intialization eventually resolves credentials
for a framework, and as region resolution comes with it,
it also resolves region.
Still it happens prior variables resolution and there's
no guarantee that region value is resolved.

Fixes https://github.com/serverless/enterprise-plugin/issues/340
2020-01-16 11:33:29 +01:00
Eric Silva
526b21b994 refactor: corrected spelling errors (#7218) 2020-01-15 09:37:23 +01:00
Mariusz Nowak
8814671435 fix(AWS APIGW): Fix default resource policy configuration
Regression introduced with #7138
Fixes #7194 #7211
2020-01-14 12:56:23 +01:00
Mariusz Nowak
5e63cee340 fix(AWS Lambda): Do not break permission resource
Fixes #7189
2020-01-09 18:28:28 +01:00
Mariusz Nowak
77b92686a7 refactor(AWS Lambda): Do not deep merge when not necessary 2020-01-09 18:28:28 +01:00
Mariusz Nowak
cbf8c74c6d refactor(AWS Lambda): Resolve deep value once 2020-01-09 18:28:28 +01:00
Mariusz Nowak
27cda47cd4 test(AWS Lambda): Improve coverage
Expose #7189
2020-01-09 18:28:28 +01:00
Mariusz Nowak
91f1d2f203 refactor(AWS Lambda): Ensure natural function reference when no alias 2020-01-09 18:28:28 +01:00
Marc Marino
5973c9fd58 feat: support RollbackConfiguration in service config (#7193) 2020-01-09 16:19:47 +01:00
Mariusz Nowak
8932307dce test: Ensure to generate tmp files in tmp dir 2020-01-09 14:16:34 +01:00
Artur Grzybowski
9591d5a232 feat: Enhance configuration options of cloudFront event (#7170)
Fixes #7151 
Addresses partially #6843 and #6785
2020-01-09 14:07:33 +01:00
Christian
560ceee5b3 feat: Support BisectBatchOnFunctionError option on event streams (#7105) 2020-01-07 15:14:34 +01:00
maafk
3236adb040 fix: Remove hard-coded AWS partitions (#7175) 2020-01-07 14:51:08 +01:00
coyoteecd
53a18cbff6 fix: Ensure CF stacks are deleted on failed creaton attempt (#7158)
Until now, failed stack deploys when using deploymentBucket to specify
an existing bucket were left in ROLLBACK_COMPLETE state.
This required manual 'sls remove' before a redeploy.

Fixes #6612, follow-up of incomplete fix in #5631
2020-01-07 13:19:39 +01:00
YellyYU
41d7d0bf07 fix: Fix and improve openwhisk-java-maven templates (#7164) 2020-01-03 20:41:25 +01:00
Mariusz Nowak
4821ad21a5 fix(AWS Lambda): Remove AWS issue workaround
Issue was fixed on AWS side, and by next week it should be fixed for
gov-cloud regions.
Still in a meantime other AWS issue emerged,
An "A conflicting deployment is in progress." error,
Which happens only when workaround in question is involved

Fixes #7137
2020-01-03 14:17:03 +01:00
Mariusz Nowak
b5dbdafe5b fix(Plugins): Fix resolution of config when installing plugin
Fixes #7130
2019-12-29 18:56:10 +01:00
b_d
e662a91d92 fix(AWS APIGW): Fix handling of removal of resourcePolicy setting
Fixes #6789
2019-12-27 21:04:07 +01:00
Mariusz Nowak
2995f8fef9
fix(AWS APIGW): Fix handling of provisionedConcurrency: 0 setting
Fixes #7133
2019-12-24 00:26:37 +01:00
Mariusz Nowak
b05d5bcce3
fix(AWS APIGW): Fix Rest API id detection when no API GW involved
Regression introduced with #7126
2019-12-23 16:10:59 +01:00
Mariusz Nowak
dfa0967ecf
fix(AWS APIGW): Ensure to apply API GW stage settings with no endpoints
Fixes #7036
2019-12-23 13:58:33 +01:00
Mariusz Nowak
4a947b215c
fix(AWS Lambda): Fix CloudWatch logs creation access
Fixes #6241
Closes #6692
2019-12-23 13:58:33 +01:00